
blog.duszynski.eu/domain-hijack-through-http-301-cache-poisoning
Preview meta tags from the blog.duszynski.eu website.
Linked Hostnames
9- 5 links toblog.duszynski.eu
- 2 links towww.linkedin.com
- 1 link toaddons.mozilla.org
- 1 link tochrome.google.com
- 1 link togithub.com
- 1 link totwitter.com
- 1 link tovimeo.com
- 1 link towww.reddit.com
Search Engine Appearance
Permanent URL Hijack Through 301 HTTP Redirect Cache Poisoning
This blog post describes an interesting technique of abusing the standard HTTP 301 responses (“Permanent redirect”) to poison browser cache and achieve endpoint persistence for chosen non-TLS resources. Combined with the “Client Domain Hooking”, this has an interesting impact from the security point of view.
Bing
Permanent URL Hijack Through 301 HTTP Redirect Cache Poisoning
This blog post describes an interesting technique of abusing the standard HTTP 301 responses (“Permanent redirect”) to poison browser cache and achieve endpoint persistence for chosen non-TLS resources. Combined with the “Client Domain Hooking”, this has an interesting impact from the security point of view.
DuckDuckGo
Permanent URL Hijack Through 301 HTTP Redirect Cache Poisoning
This blog post describes an interesting technique of abusing the standard HTTP 301 responses (“Permanent redirect”) to poison browser cache and achieve endpoint persistence for chosen non-TLS resources. Combined with the “Client Domain Hooking”, this has an interesting impact from the security point of view.
General Meta Tags
8- titlePermanent URL Hijack Through 301 HTTP Redirect Cache Poisoning – duszynski.eu – Piotr Duszyński - Personal Blog
- charsetutf-8
- Content-Typetext/html; charset=utf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1.0, maximum-scale=1.0
Open Graph Meta Tags
2- og:descriptionThis blog post describes an interesting technique of abusing the standard HTTP 301 responses (“Permanent redirect”) to poison browser cache and achieve endpoint persistence for chosen non-TLS resources. Combined with the “Client Domain Hooking”, this has an interesting impact from the security point of view.
- og:titlePermanent URL Hijack Through 301 HTTP Redirect Cache Poisoning
Link Tags
3- alternate/feed.xml
- stylesheet/style.css
- stylesheet//cdnjs.cloudflare.com/ajax/libs/highlight.js/9.15.6/styles/default.min.css
Emails
1- ?subject=Permanent URL Hijack Through 301 HTTP Redirect Cache Poisoning&body=Hey! Please check this article out. It may be interesting for you. http://blog.duszynski.eu/domain-hijack-through-http-301-cache-poisoning/
Links
14- http://www.reddit.com/submit?url=http://blog.duszynski.eu/domain-hijack-through-http-301-cache-poisoning/&title=Permanent URL Hijack Through 301 HTTP Redirect Cache Poisoning
- https://addons.mozilla.org/en-US/firefox/addon/force-https
- https://blog.duszynski.eu
- https://blog.duszynski.eu/about
- https://blog.duszynski.eu/client-domain-hooking-in-practice